10-17-2010 09:39 AM - edited 03-11-2019 11:55 AM
If there is a need to block unwanted or malicious connections on firewall, shun is advised.
Appreciate if any of the gurus here can help me understand what is different in shun than using the ACL for the same purpose.
In which typical scenario is shun preferred over acl.
TIA.
Solved! Go to Solution.
10-17-2010 05:16 PM
Hi,
Another difference between "shun" and ACLs is in the packet processing. "Shun"ning is performed at the very first in the packet processing steps while ACL checks are performed after a "Flow lookup" or "Connection entry" lookup.
So basically it means, if there is an exisiting connection for some kind of traffic and you decide to block it using ACLs it will not happen unless that connection is torn down and a new one created. But if you decide to "shun" that host, then in spite of the exisiting connection entry "anything and everything" from the host will be blocked.
This is the reason why when we configure IPS to block hosts on ASAs (using signature action as "request block"), it uses the "shun" command rather than ACLs (which it uses for router's and switches).
Hope that is clear!!
Thanks and Regards,
Prapanch
10-17-2010 09:49 AM
acl will drop everything between a source and destination
whereas using shun you can specify a threshold after which it will start shunning, for example say if you see x number of packets in a duration of y mins from z shun the traffic
hope it helps
- JA
10-17-2010 10:12 AM
Hello,
Shun will block everything from the specified host, ACL`s will allow you to permit some ports/protocols and deny the rest of the traffic from the specified host.
Cheers
Mike
10-17-2010 05:16 PM
Hi,
Another difference between "shun" and ACLs is in the packet processing. "Shun"ning is performed at the very first in the packet processing steps while ACL checks are performed after a "Flow lookup" or "Connection entry" lookup.
So basically it means, if there is an exisiting connection for some kind of traffic and you decide to block it using ACLs it will not happen unless that connection is torn down and a new one created. But if you decide to "shun" that host, then in spite of the exisiting connection entry "anything and everything" from the host will be blocked.
This is the reason why when we configure IPS to block hosts on ASAs (using signature action as "request block"), it uses the "shun" command rather than ACLs (which it uses for router's and switches).
Hope that is clear!!
Thanks and Regards,
Prapanch
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide